{"id":9497,"date":"2020-08-28T08:13:42","date_gmt":"2020-08-28T08:13:42","guid":{"rendered":"https:\/\/www.experfy.com\/blog\/?p=9497"},"modified":"2023-11-13T17:30:11","modified_gmt":"2023-11-13T17:30:11","slug":"machine-learning-vs-cybercrime-4-ways-ml-is-fighting-back","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/bigdata-cloud\/machine-learning-vs-cybercrime-4-ways-ml-is-fighting-back\/","title":{"rendered":"Machine Learning Vs. Cybercrime: 4 Ways ML is Fighting Back"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9497\" class=\"elementor elementor-9497\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-332fc562 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"332fc562\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d8be0f\" data-id=\"d8be0f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7c3b1c1b elementor-widget elementor-widget-text-editor\" data-id=\"7c3b1c1b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Takeaway:<\/strong>\u00a0<em>AI and ML are powerful forces in disrupting cybercrime, protecting enterprises, and safeguarding against data breaches.<\/em><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Cybercrime is constantly finding new ways to wreak havoc, steal your private information, and commit all kinds of mischief. New technologies such as\u00a0<a href=\"https:\/\/www.techopedia.com\/definition\/190\/artificial-intelligence-ai\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"broken_link\">artificial intelligence<\/a>\u00a0(AI) and\u00a0<a href=\"https:\/\/www.techopedia.com\/definition\/8181\/machine-learning\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"broken_link\">machine learning (ML)<\/a>\u00a0have already been leveraged by hackers and cyber criminals for their malicious intents.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>As one of the founders and\u00a0<a href=\"https:\/\/privacyaustralia.net\/privacy-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">CEO of Intel, Andy Grove once said<\/a>:<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>\u201c<em>At the heart of the Internet culture is a force that wants to find out everything about you. And once it has found out everything about you and two hundred million others, that\u2019s a very valuable asset, and people will be tempted to trade and do commerce with that asset.\u201d<\/em><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>However, AI and ML are also powerful forces in disrupting\u00a0cybercrime, protecting enterprises, and safeguarding data against breaches and exploits. What are some recent developments in adopting ML for <a href=\"https:\/\/www.techopedia.com\/definition\/2387\/cybercrime\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"broken_link\">cybercrime defence<\/a>?<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9460eac elementor-widget elementor-widget-heading\" data-id=\"9460eac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2 id=\"protecting-credit-card-security-and-privacy\">Protecting Credit Card Security and Privacy<\/h2>\n<!-- \/wp:heading --><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c5431c elementor-widget elementor-widget-text-editor\" data-id=\"8c5431c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Today, protecting the privacy and security of shoppers\u2019 credit cards is mandatory \u2013 lots of people shop online, plus even in retail stores, credit cards are used routinely. Every single transaction that occurs must be examined in real-time for signs of fraud.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>A truly titanic feat if we think about the fact that a global payment processor, such as Mastercard, can process nearly 165 million transactions per hour.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Only ML algorithms powered by\u00a0<a href=\"https:\/\/www.techopedia.com\/definition\/4595\/high-performance-computing-hpc\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"broken_link\">high-performance computing (HPC)<\/a>\u00a0are able to establish this much-needed layer of protection by\u00a0<a href=\"https:\/\/www.cio.com\/article\/3429816\/battling-fraud-and-cybercrime-with-machine-learning.html\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"broken_link\">applying 1.9 million rules to each transaction<\/a>\u00a0in less than one second.<\/p>\n<!-- \/wp:paragraph -->\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75b030d elementor-widget elementor-widget-heading\" data-id=\"75b030d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2 id=\"teaching-users-how-to-protect-themselves\">Teaching Users How to Protect Themselves<\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-869996b elementor-widget elementor-widget-text-editor\" data-id=\"869996b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The most effective way to prevent some forms of cybercrime such as\u00a0<a href=\"https:\/\/www.techopedia.com\/definition\/4049\/phishing\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"broken_link\">phishing<\/a>\u00a0is to simply teach people how to avoid falling for them. Most phishing crimes are quite transparent, while others are sneakier and harder to detect. For this reason, many companies teach their employees how to protect themselves against phishing with simulation campaigns.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Some workers in an organization are inherently more vulnerable than others \u2013 but those who aren\u2019t, still keep getting the same annoying messages over and over no matter what.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><a href=\"https:\/\/www.hoxhunt.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Hoxhunt<\/a>\u00a0is a company that employs ML to take the effectiveness of phishing simulations to the next level. Instead of teaching the same lessons to everyone regardless of their abilities, roles and email use patterns, the system is able to draw information from the individual responses of each employee.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>The AI then \u201cpersonalizes\u201d the learning experience accordingly, sending fake phishing emails over time with increasing sophistication to test people\u2019s vigilance. The more frequently a worker falls for the phishing\u00a0<a href=\"https:\/\/www.techopedia.com\/definition\/5757\/simulation\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"broken_link\">simulation<\/a>, the more training he or she will receive. Similarly, if a user demonstrates a higher level of awareness, the platform will reduce the frequency of the simulations.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fcca933 elementor-widget elementor-widget-heading\" data-id=\"fcca933\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">As Hoxhunt CEO Mika Aalto explained:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a64f3fb elementor-widget elementor-widget-text-editor\" data-id=\"a64f3fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u201c<em>One of the multiple challenges faced by organizations today is the severe shortage of talented security professionals in the market. With the support of ML, it\u2019s possible to tailor individual training to each employee based on their role and progression, without adding extra constraint to the current team.<\/em>\u201d<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f3248d5 elementor-widget elementor-widget-heading\" data-id=\"f3248d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3 id=\"fighting-fire-with-fire\">Fighting Fire with Fire<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-37c9dac elementor-widget elementor-widget-text-editor\" data-id=\"37c9dac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>Although the use of new ML\u00a0<a href=\"https:\/\/www.techopedia.com\/definition\/3739\/algorithm\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"broken_link\">algorithms<\/a>\u00a0is helping cybercriminals automate their massive attacks and exploits, AI can be used to automate and streamline data analysis for cybercrime defence as well. AI programs can examine incoming and outgoing business traffic at an amazing speed to detect any anomaly or abnormality in data patterns.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>They can be used to spot a breach as it occurs, effectively preventing it, or at least mitigating it. Supervised learning can help the AI become more efficient in detecting advanced\u00a0<a href=\"https:\/\/www.techopedia.com\/definition\/4015\/malicious-software-malware\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"broken_link\">malware<\/a>\u00a0over time.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>For example, DeepArmor is an ML-based tool that leverages Google Cloud Machine Learning Engine to prevent endpoint attacks by detecting threats early\u00a0<a href=\"https:\/\/www.datto.com\/library\/how-is-machine-learning-used-for-cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"broken_link\">with 99.5% accuracy<\/a>.<\/p>\n<!-- \/wp:paragraph -->\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3fbabbf elementor-widget elementor-widget-text-editor\" data-id=\"3fbabbf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00a0<\/p>\n<p>The scalability of AI is also critical to reduce the overwhelming workload of IT security departments that are in dire need of more streamlined processes to parse through all the data and root out threats.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Especially in the case of smaller businesses,\u00a0<a href=\"https:\/\/powerconsulting.com\/smb-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">nearly one-quarter of enterprises lack the resources<\/a>\u00a0to achieve effective in-house cybersecurity such as having a fully-dedicated team to monitor performance and spot signs of a threat.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>AI can classify risk autonomously, suggest a course of action, and, when coupled with human efforts, enable egregious threat-based decision-making that goes beyond merely relying on pre-defined risk management strategies.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd49bfa elementor-widget elementor-widget-heading\" data-id=\"dd49bfa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3 id=\"skipping-dangerous-hijack-networks\">Skipping Dangerous Hijack Networks<\/h3>\n<!-- \/wp:heading --><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d0552d elementor-widget elementor-widget-text-editor\" data-id=\"8d0552d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<!-- wp:paragraph -->\n<p>An increasingly popular cybercrime is to hijack IP addresses for malicious purposes such as stealing\u00a0<a href=\"https:\/\/www.techopedia.com\/definition\/27531\/cryptocurrency\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"broken_link\">cryptocurrencies<\/a>\u00a0or sending malware and spam. The\u00a0<a href=\"https:\/\/www.techopedia.com\/definition\/6193\/border-gateway-protocol-bgp\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"broken_link\">Border Gateway Protocol (BGP)<\/a>\u00a0is a routing mechanism used to send\u00a0<a href=\"https:\/\/www.techopedia.com\/definition\/6751\/data-packet\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"broken_link\">data packets<\/a>\u00a0to their correct destination and exchange data between networks.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Back in the late 1990s, a critical shortcoming leading to a serious exploit was found by a team of hackers. More than 20 years later, no security procedures are available to validate messages, and IP hijackers can easily redirect data packets to specific \u201cbad\u201d networks.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Even companies like Google and Amazon have been damaged by\u00a0<a href=\"https:\/\/www.techopedia.com\/definition\/27966\/internet-protocol-hijacking-ip-hijacking\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"broken_link\">IP hijacking<\/a>\u00a0attempts, that are used for global espionage as well. A new <a href=\"https:\/\/www.experfy.com\/blog\/what-machine-learning-data-poisoning\/\" target=\"_blank\" rel=\"noreferrer noopener\">machine learning<\/a> system has been developed by researchers at MIT\u2019s Computer Science and Artificial Intelligence Laboratory (CSAIL).<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>They identified some of the characteristics of IP hijackers such as high volatility and the presence of foreign IP addresses, and\u00a0<a href=\"https:\/\/ucsdnews.ucsd.edu\/pressrelease\/using-machine-learning-to-hunt-down-cybercriminals\" target=\"_blank\" rel=\"noreferrer noopener\">flagged over 800 suspicious networks<\/a>\u00a0\u2013 some of which have been used for malicious purposes for years. This system could be used to block fraudulent routing incidents and complement the existing solutions to prevent these crimes.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63a3ce6 elementor-widget elementor-widget-heading\" data-id=\"63a3ce6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conclusion<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e9bbc20 elementor-widget elementor-widget-text-editor\" data-id=\"e9bbc20\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AI and ML are among the key drivers of the Fourth Industrial Revolution. As the risk and threat landscape continues to change and evolve, these technologies are the fundamental instruments that we need to prepare an adequate response.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Takeaway:\u00a0AI and ML are powerful forces in disrupting cybercrime, protecting enterprises, and safeguarding against data breaches. Cybercrime is constantly finding new ways to wreak havoc, steal your private information, and commit all kinds of mischief. New technologies such as\u00a0artificial intelligence\u00a0(AI) and\u00a0machine learning (ML)\u00a0have already been leveraged by hackers and cyber criminals for their malicious intents.<\/p>\n","protected":false},"author":740,"featured_media":9498,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[187],"tags":[226,127,225],"ppma_author":[3585],"class_list":["post-9497","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bigdata-cloud","tag-ai","tag-cybersecurity","tag-ml"],"authors":[{"term_id":3585,"user_id":740,"is_guest":0,"slug":"claudio-buttice","display_name":"Claudio Buttic\u00e9","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/04\/medium_7baf9ebc-2c25-4c4a-888d-7c1fc9aaf732-150x150.jpg","user_url":"https:\/\/www.medsnews.com\/","last_name":"Buttic\u00e9","first_name":"Claudio","job_title":"","description":"Dr. Claudio Buttic\u00e8, Pharm.D., a Freelance Journalist and Writer, is a former clinical and hospital pharmacist,. He is now an\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/User:Daimyo2\" target=\"_blank\" rel=\"noopener\">accomplished book author<\/a>\u00a0who has written on topics such as medicine, technology, world poverty, and science. His latest book is \"<a href=\"https:\/\/www.abc-clio.com\/ABC-CLIOCorporate\/product.aspx?pc=A5958C\">Universal Health Care<\/a>\". Many of his articles have been published in magazines such as\u00a0<a href=\"http:\/\/www.cracked.com\/members\/Tyresia2\/\" target=\"_blank\" rel=\"noopener\">Cracked<\/a>,\u00a0<a href=\"https:\/\/www.theelephant.info\/author\/cbuttice\/\" target=\"_blank\" rel=\"noopener\">The Elephant<\/a>,\u00a0<a href=\"http:\/\/www.digitaljournal.com\/user\/406448\/news\" target=\"_blank\" rel=\"noopener\">Digital Journal<\/a>,\u00a0<a href=\"https:\/\/trofire.com\/author\/cbutticedr\/\" target=\"_blank\" rel=\"noopener\">The Ring of Fire<\/a>, and\u00a0<a href=\"https:\/\/www.businessinsider.com\/italy-experiments-with-eating-insects-2016-2?IR=T\" target=\"_blank\" rel=\"noopener\">Business Insider<\/a>. He has also published pharmacology and psychology papers on several clinical journals and works as a medical consultant and advisor for many companies across the globe."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/9497","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/740"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=9497"}],"version-history":[{"count":5,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/9497\/revisions"}],"predecessor-version":[{"id":34073,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/9497\/revisions\/34073"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/9498"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=9497"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=9497"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=9497"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=9497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}